Abstract
Many applications based on satellite communication like national defence and security rely on the satellite images as an important source of information. It is therefore, mandatory to secure satellite imagery while transmitting them over communication channels to protect from unauthorized access and usage. In this paper, chaotic logistic map based satellite image encryption scheme is proposed to meet the requirement of secure satellite-based communication. The algorithm is based on the concept of permuting the pixels of satellite image, then improving the pixels gray value distribution from cryptographic viewpoint. The permutation of image pixels is carried out in discrete wavelet domain and the relationship between the encrypted and the original satellite image is confused using chaotic-state modulation technique, thereby significantly increasing the resistance to statistical attacks. Experimental results demonstrate that the scheme has the advantage of high sensitivity to secret key and large key space. Moreover, the encrypted satellite images have uniform gray level distributions, high entropies and low correlation coefficients. Hence, the theoretical and experimental analyses confirm that the proposed scheme has high security and can be applied for practical satellite image protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nair, G.M.: Role of Communications Satellites in National Development. IETE Technical Review 25(1), 3–8 (2008)
Haller, L. L., Sakazaki, M. S.: Commercial Space and United States National Security, http://www.fas.org/spp/eprint/article06.html (accessed on December 4, 2010)
Bourbakis, N., Alexopoulos, C.: Picture data encryption using SCAN patterns. Pattern Recognition 25(6), 567–581 (1992)
Chang, C.C., Hwang, M.S., Chen, T.S.: A new encryption algorithm for image cryptosystems. Journal of Systems Software 58, 83–91 (2001)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(6), 1259–1284 (1998)
Cheng, H., Li, X.B.: Partial encryption of compressed images and videos. IEEE Transaction on Signal Processing 48(8), 2439–2451 (2000)
Chen, G.Y., Mao, Y.B., Chui, C.K.: A Symmetric Image Encryption Scheme based on 3D Chaotic Cat maps. Chaos Solitons and Fractals 21(3), 749–761 (2004)
Guan, Z., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Physics Letters A 346(1-3), 153–157 (2005)
Mao, Y., Lian, S., Chen, G.: A Novel Fast Image Encryption Scheme based on 3D Chaotic Baker maps. International Journal of Bifurcation and Chaos 14(10), 3616–3624 (2004)
Lian, S., Sun, J., Wang, Z.: A Block Cipher based on a Suitable use of Chaotic Standard map. Chaos, Solitons and Fractals 26(1), 117–129 (2005)
Zhang, L., Liao, X., Wang, X.: An Image Encryption Approach based on Chaotic maps. Chaos, Solitons and Fractals 24(3), 759–765 (2005)
Pareek, N.K., Patidar, V., Sud, K.K.: Image Encryption using Chaotic Logistic map. Image and Vision Computing 24(9), 926–934 (2006)
Tong, X., Cui, M.: Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Signal Processing 89(4), 480–491 (2008)
Tang, Y., Wang, Z., Fang, J.: Image encryption using chaotic coupled map lattices with time varying delays. Communication in Nonlinear Science and Numerical Simulation 15(9), 2456–2468 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ahmad, M., Farooq, O. (2011). Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-22577-2_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22576-5
Online ISBN: 978-3-642-22577-2
eBook Packages: Computer ScienceComputer Science (R0)